# Lambda Execution Role resource "aws_iam_role_policy_attachment" "lambda_execution_role_policy_attachement_1" { role = data.aws_ssm_parameter.lambda_role_name.value policy_arn = "arn:aws:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole" } resource "aws_iam_policy" "lambda_execution_role_policy" { name = "${local.name_prefix}-lambda-execution-role-policy" description = "A custom policy for Lambda to access ECR backend repository" policy = data.aws_iam_policy_document.lambda_execution_role_policy.json tags = merge(local.required_tags, var.tags) } resource "aws_iam_role_policy_attachment" "lambda_role_policy_attachement_2" { role = data.aws_ssm_parameter.lambda_role_name.value policy_arn = aws_iam_policy.lambda_execution_role_policy.arn } # Api Gateway Execution Role resource "aws_iam_role" "api_gateway_execution_role" { name = "${local.name_prefix}-api-gateway-execution-role" assume_role_policy = data.aws_iam_policy_document.api_gateway_execution_assume_role_policy.json tags = merge(local.required_tags) } resource "aws_iam_policy" "api_gateway_execution_role_policy" { name = "${local.name_prefix}-api_gateway_execution-role-policy" description = "A custom policy for Api Gateway executions" policy = data.aws_iam_policy_document.api_gateway_execution_role_policy.json tags = merge(local.required_tags, var.tags) } resource "aws_iam_role_policy_attachment" "api_gateway_execution_role_policy_attachement_1" { role = aws_iam_role.api_gateway_execution_role.name policy_arn = aws_iam_policy.api_gateway_execution_role_policy.arn } # Api Gateway Cloudwatch Role resource "aws_iam_role" "api_gateway_cloudwatch_role" { name = "${local.name_prefix}-api-gateway-cloudwatch-role" assume_role_policy = <